Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-1005 (GCVE-0-2011-1005)
Vulnerability from cvelistv5 – Published: 2011-03-02 19:00 – Updated: 2024-08-06 22:14- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:14:26.987Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2011:0910",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"name": "[oss-security] 20110221 Re: CVE request: ruby: FileUtils is vulnerable to symlink race attacks + Exception methods can bypass $SAFE",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/5"
},
{
"name": "MDVSA-2011:098",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"name": "ADV-2011-0539",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0539"
},
{
"name": "RHSA-2011:0909",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"name": "43573",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43573"
},
{
"name": "[oss-security] 20110221 CVE request: ruby: FileUtils is vulnerable to symlink race attacks + Exception methods can bypass $SAFE",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/2"
},
{
"name": "RHSA-2011:0908",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"name": "70957",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/70957"
},
{
"name": "FEDORA-2011-1876",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html"
},
{
"name": "FEDORA-2011-1913",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html"
},
{
"name": "46458",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/46458"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "MDVSA-2011:097",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"name": "APPLE-SA-2012-05-09-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "43420",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43420"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-03-10T10:00:00",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2011:0910",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"name": "[oss-security] 20110221 Re: CVE request: ruby: FileUtils is vulnerable to symlink race attacks + Exception methods can bypass $SAFE",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/5"
},
{
"name": "MDVSA-2011:098",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"name": "ADV-2011-0539",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0539"
},
{
"name": "RHSA-2011:0909",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"name": "43573",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43573"
},
{
"name": "[oss-security] 20110221 CVE request: ruby: FileUtils is vulnerable to symlink race attacks + Exception methods can bypass $SAFE",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/2"
},
{
"name": "RHSA-2011:0908",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"name": "70957",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/70957"
},
{
"name": "FEDORA-2011-1876",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html"
},
{
"name": "FEDORA-2011-1913",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html"
},
{
"name": "46458",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/46458"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "MDVSA-2011:097",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"name": "APPLE-SA-2012-05-09-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "43420",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43420"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-1005",
"datePublished": "2011-03-02T19:00:00",
"dateReserved": "2011-02-14T00:00:00",
"dateUpdated": "2024-08-06T22:14:26.987Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"876B2575-4F81-4A70-9A88-9BEE44649626\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.6-420:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AE63237-91FC-45BD-928F-AA428E2FFD95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D86FC99-3521-4E22-8FD3-65CEB05A6342\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.7-330:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3684A343-ABD7-4B80-993C-1F3CC0F983DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FAFAB6A-3299-4BEE-BDB9-3918DDA5D3DB\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.\"}, {\"lang\": \"es\", \"value\": \"La funcionalidad safe-level de Ruby 1.8.6 hasta la versi\\u00f3n 1.8.6-420, 1.8.7 hasta la 1.8.7-330 y 1.8.8dev permite a atacantes, dependiendo del contexto, modificar cadenas de texto a trav\\u00e9s del m\\u00e9todo Exception#to_s method, como se ha demostrado cambiando el pathname previsto.\"}]",
"id": "CVE-2011-1005",
"lastModified": "2024-11-21T01:25:18.713",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2011-03-02T20:00:01.880",
"references": "[{\"url\": \"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://osvdb.org/70957\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/43420\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/43573\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.apple.com/kb/HT5281\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:097\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:098\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2011/02/21/2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2011/02/21/5\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0908.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0909.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0910.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/46458\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0539\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=678920\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/70957\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/43420\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/43573\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT5281\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:097\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:098\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2011/02/21/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2011/02/21/5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0908.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0909.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0910.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/46458\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0539\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=678920\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-1005\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-03-02T20:00:01.880\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.\"},{\"lang\":\"es\",\"value\":\"La funcionalidad safe-level de Ruby 1.8.6 hasta la versi\u00f3n 1.8.6-420, 1.8.7 hasta la 1.8.7-330 y 1.8.8dev permite a atacantes, dependiendo del contexto, modificar cadenas de texto a trav\u00e9s del m\u00e9todo Exception#to_s method, como se ha demostrado cambiando el pathname previsto.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"876B2575-4F81-4A70-9A88-9BEE44649626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.6-420:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AE63237-91FC-45BD-928F-AA428E2FFD95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D86FC99-3521-4E22-8FD3-65CEB05A6342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.7-330:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3684A343-ABD7-4B80-993C-1F3CC0F983DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FAFAB6A-3299-4BEE-BDB9-3918DDA5D3DB\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://osvdb.org/70957\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/43420\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/43573\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT5281\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:097\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:098\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/02/21/2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/02/21/5\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0908.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0909.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0910.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/46458\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0539\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=678920\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/70957\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43420\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43573\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT5281\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:097\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:098\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/02/21/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/02/21/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0908.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0909.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0910.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/46458\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0539\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=678920\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}"
}
}
CERTA-2013-AVI-543
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1789"
},
{
"name": "CVE-2002-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-2443"
},
{
"name": "CVE-2013-4073",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4073"
},
{
"name": "CVE-2010-1322",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1322"
},
{
"name": "CVE-2013-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4921"
},
{
"name": "CVE-2013-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1989"
},
{
"name": "CVE-2011-2939",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2939"
},
{
"name": "CVE-2013-4935",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4935"
},
{
"name": "CVE-2010-4020",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4020"
},
{
"name": "CVE-2013-4920",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4920"
},
{
"name": "CVE-2013-1985",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1985"
},
{
"name": "CVE-2008-7247",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-7247"
},
{
"name": "CVE-2013-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2001"
},
{
"name": "CVE-2008-4098",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4098"
},
{
"name": "CVE-2010-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1158"
},
{
"name": "CVE-2012-5526",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5526"
},
{
"name": "CVE-2012-0260",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0260"
},
{
"name": "CVE-2013-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2003"
},
{
"name": "CVE-2013-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1983"
},
{
"name": "CVE-2013-1987",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1987"
},
{
"name": "CVE-2013-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4083"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2012-1798",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1798"
},
{
"name": "CVE-2013-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2004"
},
{
"name": "CVE-2013-1982",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1982"
},
{
"name": "CVE-2013-4925",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4925"
},
{
"name": "CVE-2013-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1998"
},
{
"name": "CVE-2013-1997",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1997"
},
{
"name": "CVE-2013-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3560"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2013-1415",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1415"
},
{
"name": "CVE-2013-4926",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4926"
},
{
"name": "CVE-2013-1992",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1992"
},
{
"name": "CVE-2013-1988",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1988"
},
{
"name": "CVE-2012-5581",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5581"
},
{
"name": "CVE-2013-1993",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1993"
},
{
"name": "CVE-2013-2487",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2487"
},
{
"name": "CVE-2010-4021",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4021"
},
{
"name": "CVE-2013-4930",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4930"
},
{
"name": "CVE-2013-4928",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4928"
},
{
"name": "CVE-2013-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3556"
},
{
"name": "CVE-2012-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1016"
},
{
"name": "CVE-2005-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0448"
},
{
"name": "CVE-2013-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3555"
},
{
"name": "CVE-2013-4933",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4933"
},
{
"name": "CVE-2012-0259",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0259"
},
{
"name": "CVE-2013-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3558"
},
{
"name": "CVE-2013-1984",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1984"
},
{
"name": "CVE-2013-3559",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3559"
},
{
"name": "CVE-2013-4923",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4923"
},
{
"name": "CVE-2013-4929",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4929"
},
{
"name": "CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"name": "CVE-2013-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2002"
},
{
"name": "CVE-2013-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1981"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2013-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3557"
},
{
"name": "CVE-2004-0452",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-0452"
},
{
"name": "CVE-2013-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1619"
},
{
"name": "CVE-2013-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1999"
},
{
"name": "CVE-2013-4931",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4931"
},
{
"name": "CVE-2010-1324",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1324"
},
{
"name": "CVE-2013-4932",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4932"
},
{
"name": "CVE-2012-4481",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4481"
},
{
"name": "CVE-2013-3562",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3562"
},
{
"name": "CVE-2010-1626",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1626"
},
{
"name": "CVE-2013-1996",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1996"
},
{
"name": "CVE-2013-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1990"
},
{
"name": "CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"name": "CVE-2005-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0156"
},
{
"name": "CVE-2013-1861",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1861"
},
{
"name": "CVE-2013-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1788"
},
{
"name": "CVE-2013-4927",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4927"
},
{
"name": "CVE-2013-4936",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4936"
},
{
"name": "CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"name": "CVE-2011-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0284"
},
{
"name": "CVE-2013-1862",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1862"
},
{
"name": "CVE-2013-4924",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4924"
},
{
"name": "CVE-2013-2066",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2066"
},
{
"name": "CVE-2010-1323",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1323"
},
{
"name": "CVE-2013-2062",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2062"
},
{
"name": "CVE-2013-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2005"
},
{
"name": "CVE-2013-2063",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2063"
},
{
"name": "CVE-2013-2486",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2486"
},
{
"name": "CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"name": "CVE-2013-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3561"
},
{
"name": "CVE-2013-4934",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4934"
},
{
"name": "CVE-2013-1986",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1986"
},
{
"name": "CVE-2013-4922",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4922"
},
{
"name": "CVE-2013-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1790"
},
{
"name": "CVE-2013-1896",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1896"
},
{
"name": "CVE-2013-2000",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2000"
},
{
"name": "CVE-2013-1995",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1995"
},
{
"name": "CVE-2012-1610",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1610"
},
{
"name": "CVE-2013-2116",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2116"
},
{
"name": "CVE-2012-6095",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6095"
},
{
"name": "CVE-2005-4278",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-4278"
},
{
"name": "CVE-2007-4460",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4460"
}
],
"links": [],
"reference": "CERTA-2013-AVI-543",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-09-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Certaines d\u0027entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 24 septembre 2013",
"url": "http://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html"
}
]
}
CERTA-2013-AVI-543
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1789"
},
{
"name": "CVE-2002-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-2443"
},
{
"name": "CVE-2013-4073",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4073"
},
{
"name": "CVE-2010-1322",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1322"
},
{
"name": "CVE-2013-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4921"
},
{
"name": "CVE-2013-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1989"
},
{
"name": "CVE-2011-2939",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2939"
},
{
"name": "CVE-2013-4935",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4935"
},
{
"name": "CVE-2010-4020",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4020"
},
{
"name": "CVE-2013-4920",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4920"
},
{
"name": "CVE-2013-1985",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1985"
},
{
"name": "CVE-2008-7247",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-7247"
},
{
"name": "CVE-2013-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2001"
},
{
"name": "CVE-2008-4098",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4098"
},
{
"name": "CVE-2010-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1158"
},
{
"name": "CVE-2012-5526",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5526"
},
{
"name": "CVE-2012-0260",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0260"
},
{
"name": "CVE-2013-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2003"
},
{
"name": "CVE-2013-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1983"
},
{
"name": "CVE-2013-1987",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1987"
},
{
"name": "CVE-2013-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4083"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2012-1798",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1798"
},
{
"name": "CVE-2013-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2004"
},
{
"name": "CVE-2013-1982",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1982"
},
{
"name": "CVE-2013-4925",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4925"
},
{
"name": "CVE-2013-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1998"
},
{
"name": "CVE-2013-1997",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1997"
},
{
"name": "CVE-2013-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3560"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2013-1415",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1415"
},
{
"name": "CVE-2013-4926",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4926"
},
{
"name": "CVE-2013-1992",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1992"
},
{
"name": "CVE-2013-1988",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1988"
},
{
"name": "CVE-2012-5581",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5581"
},
{
"name": "CVE-2013-1993",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1993"
},
{
"name": "CVE-2013-2487",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2487"
},
{
"name": "CVE-2010-4021",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4021"
},
{
"name": "CVE-2013-4930",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4930"
},
{
"name": "CVE-2013-4928",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4928"
},
{
"name": "CVE-2013-3556",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3556"
},
{
"name": "CVE-2012-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1016"
},
{
"name": "CVE-2005-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0448"
},
{
"name": "CVE-2013-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3555"
},
{
"name": "CVE-2013-4933",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4933"
},
{
"name": "CVE-2012-0259",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0259"
},
{
"name": "CVE-2013-3558",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3558"
},
{
"name": "CVE-2013-1984",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1984"
},
{
"name": "CVE-2013-3559",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3559"
},
{
"name": "CVE-2013-4923",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4923"
},
{
"name": "CVE-2013-4929",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4929"
},
{
"name": "CVE-2013-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2067"
},
{
"name": "CVE-2013-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2002"
},
{
"name": "CVE-2013-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1981"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2013-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3557"
},
{
"name": "CVE-2004-0452",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-0452"
},
{
"name": "CVE-2013-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1619"
},
{
"name": "CVE-2013-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1999"
},
{
"name": "CVE-2013-4931",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4931"
},
{
"name": "CVE-2010-1324",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1324"
},
{
"name": "CVE-2013-4932",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4932"
},
{
"name": "CVE-2012-4481",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4481"
},
{
"name": "CVE-2013-3562",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3562"
},
{
"name": "CVE-2010-1626",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1626"
},
{
"name": "CVE-2013-1996",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1996"
},
{
"name": "CVE-2013-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1990"
},
{
"name": "CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"name": "CVE-2005-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0156"
},
{
"name": "CVE-2013-1861",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1861"
},
{
"name": "CVE-2013-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1788"
},
{
"name": "CVE-2013-4927",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4927"
},
{
"name": "CVE-2013-4936",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4936"
},
{
"name": "CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"name": "CVE-2011-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0284"
},
{
"name": "CVE-2013-1862",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1862"
},
{
"name": "CVE-2013-4924",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4924"
},
{
"name": "CVE-2013-2066",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2066"
},
{
"name": "CVE-2010-1323",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1323"
},
{
"name": "CVE-2013-2062",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2062"
},
{
"name": "CVE-2013-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2005"
},
{
"name": "CVE-2013-2063",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2063"
},
{
"name": "CVE-2013-2486",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2486"
},
{
"name": "CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"name": "CVE-2013-3561",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3561"
},
{
"name": "CVE-2013-4934",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4934"
},
{
"name": "CVE-2013-1986",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1986"
},
{
"name": "CVE-2013-4922",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4922"
},
{
"name": "CVE-2013-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1790"
},
{
"name": "CVE-2013-1896",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1896"
},
{
"name": "CVE-2013-2000",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2000"
},
{
"name": "CVE-2013-1995",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1995"
},
{
"name": "CVE-2012-1610",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1610"
},
{
"name": "CVE-2013-2116",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2116"
},
{
"name": "CVE-2012-6095",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6095"
},
{
"name": "CVE-2005-4278",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-4278"
},
{
"name": "CVE-2007-4460",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4460"
}
],
"links": [],
"reference": "CERTA-2013-AVI-543",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-09-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Certaines d\u0027entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 24 septembre 2013",
"url": "http://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html"
}
]
}
CERTA-2012-AVI-272
Vulnerability from certfr_avis - Published: - Updated:
Trente-six vulnérabilités ont été corrigées dans OS X Lion. Il est possible d'exécuter du code arbitraire à distance, d'exécuter du code en local, d'obtenir des données sensibles et d'élever ses privilèges. De nombreuses applications et fonctions sont touchées, toutes sont décrites dans le bulletin Apple référencé dans la section « Documentation ».
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à OS X Lion v10.7.4.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 OS X Lion v10.7.4.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2012-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0675"
},
{
"name": "CVE-2012-0649",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0649"
},
{
"name": "CVE-2012-0661",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0661"
},
{
"name": "CVE-2012-0658",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0658"
},
{
"name": "CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"name": "CVE-2011-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2692"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2011-3328",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3328"
},
{
"name": "CVE-2012-0659",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0659"
},
{
"name": "CVE-2011-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3212"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2821",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2821"
},
{
"name": "CVE-2012-0657",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0657"
},
{
"name": "CVE-2012-0652",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0652"
},
{
"name": "CVE-2011-1778",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1778"
},
{
"name": "CVE-2011-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0241"
},
{
"name": "CVE-2012-0660",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0660"
},
{
"name": "CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"name": "CVE-2012-0036",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0036"
},
{
"name": "CVE-2012-0662",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0662"
},
{
"name": "CVE-2012-0655",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0655"
},
{
"name": "CVE-2012-0642",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0642"
},
{
"name": "CVE-2011-4566",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4566"
},
{
"name": "CVE-2011-1777",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1777"
},
{
"name": "CVE-2011-4885",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2012-0651",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0651"
},
{
"name": "CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
},
{
"name": "CVE-2012-0830",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0830"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0656",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0656"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2012-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1182"
},
{
"name": "CVE-2012-0870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0870"
},
{
"name": "CVE-2012-0654",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0654"
}
],
"links": [],
"reference": "CERTA-2012-AVI-272",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Trente-six vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eOS\nX Lion\u003c/span\u003e. Il est possible d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance,\nd\u0027ex\u00e9cuter du code en local, d\u0027obtenir des donn\u00e9es sensibles et d\u0027\u00e9lever\nses privil\u00e8ges. De nombreuses applications et fonctions sont touch\u00e9es,\ntoutes sont d\u00e9crites dans le bulletin \u003cspan class=\"textit\"\u003eApple\u003c/span\u003e\nr\u00e9f\u00e9renc\u00e9 dans la section \u00ab Documentation \u00bb.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans OS X Lion",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5281 du 09 mai 2012",
"url": "https://support.apple.com/kb/HT5281"
}
]
}
CERTA-2011-AVI-101
Vulnerability from certfr_avis - Published: - Updated:
Deux vulnérabilités dans Ruby ont été corrigées. La première permet de contourner la politique de sécurité et la seconde de porter atteinte à l'intégrité des données.
Description
La première vulnérabilité touche la méthode to_s de la classe Exception. Celle-ci permet à un attaquant de déjouer le mécanisme de sécurité permettant la séparation des données issues de sources extérieures au programme. La seconde vulnérabilité affecte la méthode remove_entry_secure de la classe FileUtils. Celle-ci cause une situation de compétition (race condition), qui permet à une personne malveillante d'utiliser des liens symboliques pour forcer la suppression de fichiers ou de répertoires sur le système.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Pour la vulnérabilité sur la méthode Exception#to_s :
- Ruby versions 1.8.6 niveau de patch 420 et précédentes ;
- Ruby versions 1.8.7 niveau de patch 330 et précédentes ;
- Ruby versions de développement 1.8 (1.8.8dev).
Pour la vulnérabilité sur la méthode FileUtils.remove_entry_secure :
- Ruby versions 1.8.6 niveau de patch 420 et précédentes ;
- Ruby versions 1.8.7 niveau de patch 330 et précédentes ;
- Ruby versions de développement 1.8 (1.8.8dev) ;
- Ruby versions 1.9.1 niveau de patch 430 et précédentes ;
- Ruby versions 1.9.2 niveau de patch 136 et précédentes ;
- Ruby versions de développement 1.9 (1.9.3dev).
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003ePour la vuln\u00e9rabilit\u00e9 sur la m\u00e9thode \u003cTT\u003eException#to_s\u003c/TT\u003e : \u003cUL\u003e \u003cLI\u003eRuby versions 1.8.6 niveau de patch 420 et pr\u00e9c\u00e9dentes ;\u003c/LI\u003e \u003cLI\u003eRuby versions 1.8.7 niveau de patch 330 et pr\u00e9c\u00e9dentes ;\u003c/LI\u003e \u003cLI\u003eRuby versions de d\u00e9veloppement 1.8 (1.8.8dev).\u003c/LI\u003e \u003c/UL\u003e \u003cP\u003ePour la vuln\u00e9rabilit\u00e9 sur la m\u00e9thode \u003cTT\u003eFileUtils.remove_entry_secure\u003c/TT\u003e :\u003c/P\u003e \u003cUL\u003e \u003cLI\u003eRuby versions 1.8.6 niveau de patch 420 et pr\u00e9c\u00e9dentes ;\u003c/LI\u003e \u003cLI\u003eRuby versions 1.8.7 niveau de patch 330 et pr\u00e9c\u00e9dentes ;\u003c/LI\u003e \u003cLI\u003eRuby versions de d\u00e9veloppement 1.8 (1.8.8dev) ;\u003c/LI\u003e \u003cLI\u003eRuby versions 1.9.1 niveau de patch 430 et pr\u00e9c\u00e9dentes ;\u003c/LI\u003e \u003cLI\u003eRuby versions 1.9.2 niveau de patch 136 et pr\u00e9c\u00e9dentes ;\u003c/LI\u003e \u003cLI\u003eRuby versions de d\u00e9veloppement 1.9 (1.9.3dev).\u003c/LI\u003e \u003c/UL\u003e\u003c/p\u003e",
"content": "## Description\n\nLa premi\u00e8re vuln\u00e9rabilit\u00e9 touche la m\u00e9thode to_s de la classe Exception.\nCelle-ci permet \u00e0 un attaquant de d\u00e9jouer le m\u00e9canisme de s\u00e9curit\u00e9\npermettant la s\u00e9paration des donn\u00e9es issues de sources ext\u00e9rieures au\nprogramme. La seconde vuln\u00e9rabilit\u00e9 affecte la m\u00e9thode\nremove_entry_secure de la classe FileUtils. Celle-ci cause une situation\nde comp\u00e9tition (race condition), qui permet \u00e0 une personne malveillante\nd\u0027utiliser des liens symboliques pour forcer la suppression de fichiers\nou de r\u00e9pertoires sur le syst\u00e8me.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"name": "CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
}
],
"links": [],
"reference": "CERTA-2011-AVI-101",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2011-02-22T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences CVE.",
"revision_date": "2011-03-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s dans Ruby ont \u00e9t\u00e9 corrig\u00e9es. La premi\u00e8re permet de\ncontourner la politique de s\u00e9curit\u00e9 et la seconde de porter atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Ruby",
"vendor_advisories": [
{
"published_at": null,
"title": "Notes de mise \u00e0 jour Ruby du 18 f\u00e9vrier 2011",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/"
}
]
}
CERTA-2012-AVI-272
Vulnerability from certfr_avis - Published: - Updated:
Trente-six vulnérabilités ont été corrigées dans OS X Lion. Il est possible d'exécuter du code arbitraire à distance, d'exécuter du code en local, d'obtenir des données sensibles et d'élever ses privilèges. De nombreuses applications et fonctions sont touchées, toutes sont décrites dans le bulletin Apple référencé dans la section « Documentation ».
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à OS X Lion v10.7.4.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 OS X Lion v10.7.4.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2012-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0675"
},
{
"name": "CVE-2012-0649",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0649"
},
{
"name": "CVE-2012-0661",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0661"
},
{
"name": "CVE-2012-0658",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0658"
},
{
"name": "CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"name": "CVE-2011-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2692"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2011-3328",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3328"
},
{
"name": "CVE-2012-0659",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0659"
},
{
"name": "CVE-2011-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3212"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2821",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2821"
},
{
"name": "CVE-2012-0657",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0657"
},
{
"name": "CVE-2012-0652",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0652"
},
{
"name": "CVE-2011-1778",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1778"
},
{
"name": "CVE-2011-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0241"
},
{
"name": "CVE-2012-0660",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0660"
},
{
"name": "CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"name": "CVE-2012-0036",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0036"
},
{
"name": "CVE-2012-0662",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0662"
},
{
"name": "CVE-2012-0655",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0655"
},
{
"name": "CVE-2012-0642",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0642"
},
{
"name": "CVE-2011-4566",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4566"
},
{
"name": "CVE-2011-1777",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1777"
},
{
"name": "CVE-2011-4885",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2012-0651",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0651"
},
{
"name": "CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
},
{
"name": "CVE-2012-0830",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0830"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0656",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0656"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2012-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1182"
},
{
"name": "CVE-2012-0870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0870"
},
{
"name": "CVE-2012-0654",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0654"
}
],
"links": [],
"reference": "CERTA-2012-AVI-272",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Trente-six vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eOS\nX Lion\u003c/span\u003e. Il est possible d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance,\nd\u0027ex\u00e9cuter du code en local, d\u0027obtenir des donn\u00e9es sensibles et d\u0027\u00e9lever\nses privil\u00e8ges. De nombreuses applications et fonctions sont touch\u00e9es,\ntoutes sont d\u00e9crites dans le bulletin \u003cspan class=\"textit\"\u003eApple\u003c/span\u003e\nr\u00e9f\u00e9renc\u00e9 dans la section \u00ab Documentation \u00bb.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans OS X Lion",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5281 du 09 mai 2012",
"url": "https://support.apple.com/kb/HT5281"
}
]
}
CERTA-2011-AVI-101
Vulnerability from certfr_avis - Published: - Updated:
Deux vulnérabilités dans Ruby ont été corrigées. La première permet de contourner la politique de sécurité et la seconde de porter atteinte à l'intégrité des données.
Description
La première vulnérabilité touche la méthode to_s de la classe Exception. Celle-ci permet à un attaquant de déjouer le mécanisme de sécurité permettant la séparation des données issues de sources extérieures au programme. La seconde vulnérabilité affecte la méthode remove_entry_secure de la classe FileUtils. Celle-ci cause une situation de compétition (race condition), qui permet à une personne malveillante d'utiliser des liens symboliques pour forcer la suppression de fichiers ou de répertoires sur le système.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Pour la vulnérabilité sur la méthode Exception#to_s :
- Ruby versions 1.8.6 niveau de patch 420 et précédentes ;
- Ruby versions 1.8.7 niveau de patch 330 et précédentes ;
- Ruby versions de développement 1.8 (1.8.8dev).
Pour la vulnérabilité sur la méthode FileUtils.remove_entry_secure :
- Ruby versions 1.8.6 niveau de patch 420 et précédentes ;
- Ruby versions 1.8.7 niveau de patch 330 et précédentes ;
- Ruby versions de développement 1.8 (1.8.8dev) ;
- Ruby versions 1.9.1 niveau de patch 430 et précédentes ;
- Ruby versions 1.9.2 niveau de patch 136 et précédentes ;
- Ruby versions de développement 1.9 (1.9.3dev).
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003ePour la vuln\u00e9rabilit\u00e9 sur la m\u00e9thode \u003cTT\u003eException#to_s\u003c/TT\u003e : \u003cUL\u003e \u003cLI\u003eRuby versions 1.8.6 niveau de patch 420 et pr\u00e9c\u00e9dentes ;\u003c/LI\u003e \u003cLI\u003eRuby versions 1.8.7 niveau de patch 330 et pr\u00e9c\u00e9dentes ;\u003c/LI\u003e \u003cLI\u003eRuby versions de d\u00e9veloppement 1.8 (1.8.8dev).\u003c/LI\u003e \u003c/UL\u003e \u003cP\u003ePour la vuln\u00e9rabilit\u00e9 sur la m\u00e9thode \u003cTT\u003eFileUtils.remove_entry_secure\u003c/TT\u003e :\u003c/P\u003e \u003cUL\u003e \u003cLI\u003eRuby versions 1.8.6 niveau de patch 420 et pr\u00e9c\u00e9dentes ;\u003c/LI\u003e \u003cLI\u003eRuby versions 1.8.7 niveau de patch 330 et pr\u00e9c\u00e9dentes ;\u003c/LI\u003e \u003cLI\u003eRuby versions de d\u00e9veloppement 1.8 (1.8.8dev) ;\u003c/LI\u003e \u003cLI\u003eRuby versions 1.9.1 niveau de patch 430 et pr\u00e9c\u00e9dentes ;\u003c/LI\u003e \u003cLI\u003eRuby versions 1.9.2 niveau de patch 136 et pr\u00e9c\u00e9dentes ;\u003c/LI\u003e \u003cLI\u003eRuby versions de d\u00e9veloppement 1.9 (1.9.3dev).\u003c/LI\u003e \u003c/UL\u003e\u003c/p\u003e",
"content": "## Description\n\nLa premi\u00e8re vuln\u00e9rabilit\u00e9 touche la m\u00e9thode to_s de la classe Exception.\nCelle-ci permet \u00e0 un attaquant de d\u00e9jouer le m\u00e9canisme de s\u00e9curit\u00e9\npermettant la s\u00e9paration des donn\u00e9es issues de sources ext\u00e9rieures au\nprogramme. La seconde vuln\u00e9rabilit\u00e9 affecte la m\u00e9thode\nremove_entry_secure de la classe FileUtils. Celle-ci cause une situation\nde comp\u00e9tition (race condition), qui permet \u00e0 une personne malveillante\nd\u0027utiliser des liens symboliques pour forcer la suppression de fichiers\nou de r\u00e9pertoires sur le syst\u00e8me.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"name": "CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
}
],
"links": [],
"reference": "CERTA-2011-AVI-101",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2011-02-22T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences CVE.",
"revision_date": "2011-03-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s dans Ruby ont \u00e9t\u00e9 corrig\u00e9es. La premi\u00e8re permet de\ncontourner la politique de s\u00e9curit\u00e9 et la seconde de porter atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Ruby",
"vendor_advisories": [
{
"published_at": null,
"title": "Notes de mise \u00e0 jour Ruby du 18 f\u00e9vrier 2011",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/"
}
]
}
RHSA-2011:0909
Vulnerability from csaf_redhat - Published: 2011-06-28 17:27 - Updated: 2025-11-21 17:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. A context-dependent\nattacker could use this flaw to cause memory corruption, causing a Ruby\napplication that uses the BigDecimal class to crash or, possibly, execute\narbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nA race condition flaw was found in the remove system entries method in the\nFileUtils module. If a local user ran a Ruby script that uses this method,\na local attacker could use this flaw to delete arbitrary files and\ndirectories accessible to that user via a symbolic link attack.\n(CVE-2011-1004)\n\nIt was found that WEBrick (the Ruby HTTP server toolkit) did not filter\nterminal escape sequences from its log files. A remote attacker could use\nspecially-crafted HTTP requests to inject terminal escape sequences into\nthe WEBrick log files. If a victim viewed the log files with a terminal\nemulator, it could result in control characters being executed with the\nprivileges of that user. (CVE-2009-4492)\n\nA cross-site scripting (XSS) flaw was found in the way WEBrick displayed\nerror pages. A remote attacker could use this flaw to perform a cross-site\nscripting attack against victims by tricking them into visiting a\nspecially-crafted URL. (CVE-2010-0541)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 and CVE-2010-0541 issues.\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0909",
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/",
"url": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/",
"url": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/"
},
{
"category": "external",
"summary": "554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0909.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2025-11-21T17:38:25+00:00",
"generator": {
"date": "2025-11-21T17:38:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2011:0909",
"initial_release_date": "2011-06-28T17:27:00+00:00",
"revision_history": [
{
"date": "2011-06-28T17:27:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-28T13:33:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:38:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.src",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.src",
"product_id": "ruby-0:1.8.5-19.el5_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4492",
"discovery_date": "2009-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "554485"
}
],
"notes": [
{
"category": "description",
"text": "WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window\u0027s title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby WEBrick log escape sequence",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4492"
},
{
"category": "external",
"summary": "RHBZ#554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492"
}
],
"release_date": "2010-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby WEBrick log escape sequence"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2010-0541",
"discovery_date": "2010-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "587731"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby WEBrick javascript injection flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0541"
},
{
"category": "external",
"summary": "RHBZ#587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0541",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541"
}
],
"release_date": "2010-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby WEBrick javascript injection flaw"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-1004",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678913"
}
],
"notes": [
{
"category": "description",
"text": "The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Symlink race condition by removing directory trees in fileutils module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1004"
},
{
"category": "external",
"summary": "RHBZ#678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ruby: Symlink race condition by removing directory trees in fileutils module"
},
{
"cve": "CVE-2011-1005",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678920"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Untrusted codes able to modify arbitrary strings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1005"
},
{
"category": "external",
"summary": "RHBZ#678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby: Untrusted codes able to modify arbitrary strings"
}
]
}
RHSA-2011:0910
Vulnerability from csaf_redhat - Published: 2011-06-28 17:30 - Updated: 2025-11-21 17:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix three security issues are now available for\nRed Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. A context-dependent\nattacker could use this flaw to cause memory corruption, causing a Ruby\napplication that uses the BigDecimal class to crash or, possibly, execute\narbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nA race condition flaw was found in the remove system entries method in the\nFileUtils module. If a local user ran a Ruby script that uses this method,\na local attacker could use this flaw to delete arbitrary files and\ndirectories accessible to that user via a symbolic link attack.\n(CVE-2011-1004)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 issue.\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0910",
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"category": "external",
"summary": "678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0910.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2025-11-21T17:38:26+00:00",
"generator": {
"date": "2025-11-21T17:38:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2011:0910",
"initial_release_date": "2011-06-28T17:30:00+00:00",
"revision_history": [
{
"date": "2011-06-28T17:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-28T13:33:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:38:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.src",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.src",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-1004",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678913"
}
],
"notes": [
{
"category": "description",
"text": "The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Symlink race condition by removing directory trees in fileutils module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1004"
},
{
"category": "external",
"summary": "RHBZ#678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ruby: Symlink race condition by removing directory trees in fileutils module"
},
{
"cve": "CVE-2011-1005",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678920"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Untrusted codes able to modify arbitrary strings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1005"
},
{
"category": "external",
"summary": "RHBZ#678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby: Untrusted codes able to modify arbitrary strings"
}
]
}
RHSA-2011_0908
Vulnerability from csaf_redhat - Published: 2011-06-28 17:21 - Updated: 2024-11-22 04:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. A context-dependent\nattacker could use this flaw to cause memory corruption, causing a Ruby\napplication that uses the BigDecimal class to crash or, possibly, execute\narbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nIt was found that WEBrick (the Ruby HTTP server toolkit) did not filter\nterminal escape sequences from its log files. A remote attacker could use\nspecially-crafted HTTP requests to inject terminal escape sequences into\nthe WEBrick log files. If a victim viewed the log files with a terminal\nemulator, it could result in control characters being executed with the\nprivileges of that user. (CVE-2009-4492)\n\nA cross-site scripting (XSS) flaw was found in the way WEBrick displayed\nerror pages. A remote attacker could use this flaw to perform a cross-site\nscripting attack against victims by tricking them into visiting a\nspecially-crafted URL. (CVE-2010-0541)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 and CVE-2010-0541 issues.\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0908",
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/",
"url": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/",
"url": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/"
},
{
"category": "external",
"summary": "554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0908.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2024-11-22T04:24:10+00:00",
"generator": {
"date": "2024-11-22T04:24:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0908",
"initial_release_date": "2011-06-28T17:21:00+00:00",
"revision_history": [
{
"date": "2011-06-28T17:21:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-28T13:22:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:24:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.ia64",
"product": {
"name": "irb-0:1.8.1-16.el4.ia64",
"product_id": "irb-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64",
"product_id": "ruby-devel-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64",
"product_id": "ruby-docs-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64",
"product_id": "ruby-libs-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-0:1.8.1-16.el4.ia64",
"product_id": "ruby-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64",
"product_id": "ruby-mode-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.i386",
"product_id": "ruby-libs-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.i386",
"product": {
"name": "irb-0:1.8.1-16.el4.i386",
"product_id": "irb-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.i386",
"product_id": "ruby-devel-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.i386",
"product_id": "ruby-docs-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-0:1.8.1-16.el4.i386",
"product_id": "ruby-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.i386",
"product_id": "ruby-mode-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.x86_64",
"product": {
"name": "irb-0:1.8.1-16.el4.x86_64",
"product_id": "irb-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-devel-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-docs-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-libs-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-mode-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.src",
"product": {
"name": "ruby-0:1.8.1-16.el4.src",
"product_id": "ruby-0:1.8.1-16.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.ppc64",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64",
"product_id": "ruby-libs-0:1.8.1-16.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.ppc",
"product": {
"name": "irb-0:1.8.1-16.el4.ppc",
"product_id": "irb-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc",
"product_id": "ruby-devel-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc",
"product_id": "ruby-docs-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc",
"product_id": "ruby-libs-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-0:1.8.1-16.el4.ppc",
"product_id": "ruby-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc",
"product_id": "ruby-mode-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.s390x",
"product": {
"name": "irb-0:1.8.1-16.el4.s390x",
"product_id": "irb-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x",
"product_id": "ruby-devel-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x",
"product_id": "ruby-docs-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x",
"product_id": "ruby-libs-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-0:1.8.1-16.el4.s390x",
"product_id": "ruby-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x",
"product_id": "ruby-mode-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.s390",
"product_id": "ruby-libs-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.s390",
"product": {
"name": "irb-0:1.8.1-16.el4.s390",
"product_id": "irb-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.s390",
"product_id": "ruby-devel-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.s390",
"product_id": "ruby-docs-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-0:1.8.1-16.el4.s390",
"product_id": "ruby-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.s390",
"product_id": "ruby-mode-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4492",
"discovery_date": "2009-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "554485"
}
],
"notes": [
{
"category": "description",
"text": "WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window\u0027s title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby WEBrick log escape sequence",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4492"
},
{
"category": "external",
"summary": "RHBZ#554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492"
}
],
"release_date": "2010-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby WEBrick log escape sequence"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2010-0541",
"discovery_date": "2010-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "587731"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby WEBrick javascript injection flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0541"
},
{
"category": "external",
"summary": "RHBZ#587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0541",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541"
}
],
"release_date": "2010-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby WEBrick javascript injection flaw"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-1005",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678920"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Untrusted codes able to modify arbitrary strings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1005"
},
{
"category": "external",
"summary": "RHBZ#678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby: Untrusted codes able to modify arbitrary strings"
}
]
}
RHSA-2011:0908
Vulnerability from csaf_redhat - Published: 2011-06-28 17:21 - Updated: 2025-11-21 17:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. A context-dependent\nattacker could use this flaw to cause memory corruption, causing a Ruby\napplication that uses the BigDecimal class to crash or, possibly, execute\narbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nIt was found that WEBrick (the Ruby HTTP server toolkit) did not filter\nterminal escape sequences from its log files. A remote attacker could use\nspecially-crafted HTTP requests to inject terminal escape sequences into\nthe WEBrick log files. If a victim viewed the log files with a terminal\nemulator, it could result in control characters being executed with the\nprivileges of that user. (CVE-2009-4492)\n\nA cross-site scripting (XSS) flaw was found in the way WEBrick displayed\nerror pages. A remote attacker could use this flaw to perform a cross-site\nscripting attack against victims by tricking them into visiting a\nspecially-crafted URL. (CVE-2010-0541)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 and CVE-2010-0541 issues.\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0908",
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/",
"url": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/",
"url": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/"
},
{
"category": "external",
"summary": "554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0908.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2025-11-21T17:38:26+00:00",
"generator": {
"date": "2025-11-21T17:38:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2011:0908",
"initial_release_date": "2011-06-28T17:21:00+00:00",
"revision_history": [
{
"date": "2011-06-28T17:21:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-28T13:22:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:38:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.ia64",
"product": {
"name": "irb-0:1.8.1-16.el4.ia64",
"product_id": "irb-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64",
"product_id": "ruby-devel-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64",
"product_id": "ruby-docs-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64",
"product_id": "ruby-libs-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-0:1.8.1-16.el4.ia64",
"product_id": "ruby-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64",
"product_id": "ruby-mode-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.i386",
"product_id": "ruby-libs-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.i386",
"product": {
"name": "irb-0:1.8.1-16.el4.i386",
"product_id": "irb-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.i386",
"product_id": "ruby-devel-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.i386",
"product_id": "ruby-docs-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-0:1.8.1-16.el4.i386",
"product_id": "ruby-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.i386",
"product_id": "ruby-mode-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.x86_64",
"product": {
"name": "irb-0:1.8.1-16.el4.x86_64",
"product_id": "irb-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-devel-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-docs-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-libs-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-mode-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.src",
"product": {
"name": "ruby-0:1.8.1-16.el4.src",
"product_id": "ruby-0:1.8.1-16.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.ppc64",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64",
"product_id": "ruby-libs-0:1.8.1-16.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.ppc",
"product": {
"name": "irb-0:1.8.1-16.el4.ppc",
"product_id": "irb-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc",
"product_id": "ruby-devel-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc",
"product_id": "ruby-docs-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc",
"product_id": "ruby-libs-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-0:1.8.1-16.el4.ppc",
"product_id": "ruby-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc",
"product_id": "ruby-mode-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.s390x",
"product": {
"name": "irb-0:1.8.1-16.el4.s390x",
"product_id": "irb-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x",
"product_id": "ruby-devel-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x",
"product_id": "ruby-docs-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x",
"product_id": "ruby-libs-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-0:1.8.1-16.el4.s390x",
"product_id": "ruby-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x",
"product_id": "ruby-mode-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.s390",
"product_id": "ruby-libs-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.s390",
"product": {
"name": "irb-0:1.8.1-16.el4.s390",
"product_id": "irb-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.s390",
"product_id": "ruby-devel-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.s390",
"product_id": "ruby-docs-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-0:1.8.1-16.el4.s390",
"product_id": "ruby-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.s390",
"product_id": "ruby-mode-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4492",
"discovery_date": "2009-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "554485"
}
],
"notes": [
{
"category": "description",
"text": "WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window\u0027s title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby WEBrick log escape sequence",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4492"
},
{
"category": "external",
"summary": "RHBZ#554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492"
}
],
"release_date": "2010-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby WEBrick log escape sequence"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2010-0541",
"discovery_date": "2010-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "587731"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby WEBrick javascript injection flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0541"
},
{
"category": "external",
"summary": "RHBZ#587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0541",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541"
}
],
"release_date": "2010-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby WEBrick javascript injection flaw"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-1005",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678920"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Untrusted codes able to modify arbitrary strings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1005"
},
{
"category": "external",
"summary": "RHBZ#678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby: Untrusted codes able to modify arbitrary strings"
}
]
}
RHSA-2011_0910
Vulnerability from csaf_redhat - Published: 2011-06-28 17:30 - Updated: 2024-11-22 04:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix three security issues are now available for\nRed Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. A context-dependent\nattacker could use this flaw to cause memory corruption, causing a Ruby\napplication that uses the BigDecimal class to crash or, possibly, execute\narbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nA race condition flaw was found in the remove system entries method in the\nFileUtils module. If a local user ran a Ruby script that uses this method,\na local attacker could use this flaw to delete arbitrary files and\ndirectories accessible to that user via a symbolic link attack.\n(CVE-2011-1004)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 issue.\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0910",
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"category": "external",
"summary": "678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0910.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2024-11-22T04:24:19+00:00",
"generator": {
"date": "2024-11-22T04:24:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0910",
"initial_release_date": "2011-06-28T17:30:00+00:00",
"revision_history": [
{
"date": "2011-06-28T17:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-28T13:33:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:24:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.src",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.src",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-1004",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678913"
}
],
"notes": [
{
"category": "description",
"text": "The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Symlink race condition by removing directory trees in fileutils module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1004"
},
{
"category": "external",
"summary": "RHBZ#678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ruby: Symlink race condition by removing directory trees in fileutils module"
},
{
"cve": "CVE-2011-1005",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678920"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Untrusted codes able to modify arbitrary strings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1005"
},
{
"category": "external",
"summary": "RHBZ#678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby: Untrusted codes able to modify arbitrary strings"
}
]
}
RHSA-2011_0909
Vulnerability from csaf_redhat - Published: 2011-06-28 17:27 - Updated: 2024-11-22 04:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. A context-dependent\nattacker could use this flaw to cause memory corruption, causing a Ruby\napplication that uses the BigDecimal class to crash or, possibly, execute\narbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nA race condition flaw was found in the remove system entries method in the\nFileUtils module. If a local user ran a Ruby script that uses this method,\na local attacker could use this flaw to delete arbitrary files and\ndirectories accessible to that user via a symbolic link attack.\n(CVE-2011-1004)\n\nIt was found that WEBrick (the Ruby HTTP server toolkit) did not filter\nterminal escape sequences from its log files. A remote attacker could use\nspecially-crafted HTTP requests to inject terminal escape sequences into\nthe WEBrick log files. If a victim viewed the log files with a terminal\nemulator, it could result in control characters being executed with the\nprivileges of that user. (CVE-2009-4492)\n\nA cross-site scripting (XSS) flaw was found in the way WEBrick displayed\nerror pages. A remote attacker could use this flaw to perform a cross-site\nscripting attack against victims by tricking them into visiting a\nspecially-crafted URL. (CVE-2010-0541)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 and CVE-2010-0541 issues.\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0909",
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/",
"url": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/",
"url": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/"
},
{
"category": "external",
"summary": "554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0909.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2024-11-22T04:24:15+00:00",
"generator": {
"date": "2024-11-22T04:24:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0909",
"initial_release_date": "2011-06-28T17:27:00+00:00",
"revision_history": [
{
"date": "2011-06-28T17:27:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-28T13:33:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:24:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.src",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.src",
"product_id": "ruby-0:1.8.5-19.el5_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4492",
"discovery_date": "2009-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "554485"
}
],
"notes": [
{
"category": "description",
"text": "WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window\u0027s title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby WEBrick log escape sequence",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4492"
},
{
"category": "external",
"summary": "RHBZ#554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492"
}
],
"release_date": "2010-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby WEBrick log escape sequence"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2010-0541",
"discovery_date": "2010-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "587731"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby WEBrick javascript injection flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0541"
},
{
"category": "external",
"summary": "RHBZ#587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0541",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541"
}
],
"release_date": "2010-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby WEBrick javascript injection flaw"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-1004",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678913"
}
],
"notes": [
{
"category": "description",
"text": "The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Symlink race condition by removing directory trees in fileutils module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1004"
},
{
"category": "external",
"summary": "RHBZ#678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ruby: Symlink race condition by removing directory trees in fileutils module"
},
{
"cve": "CVE-2011-1005",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678920"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Untrusted codes able to modify arbitrary strings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1005"
},
{
"category": "external",
"summary": "RHBZ#678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby: Untrusted codes able to modify arbitrary strings"
}
]
}
FKIE_CVE-2011-1005
Vulnerability from fkie_nvd - Published: 2011-03-02 20:00 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2012/May/msg00001.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html | ||
| secalert@redhat.com | http://osvdb.org/70957 | ||
| secalert@redhat.com | http://secunia.com/advisories/43420 | ||
| secalert@redhat.com | http://secunia.com/advisories/43573 | ||
| secalert@redhat.com | http://support.apple.com/kb/HT5281 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:097 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:098 | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2011/02/21/2 | Patch | |
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2011/02/21/5 | Patch | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2011-0908.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2011-0909.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2011-0910.html | ||
| secalert@redhat.com | http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/ | Exploit, Patch, Vendor Advisory | |
| secalert@redhat.com | http://www.securityfocus.com/bid/46458 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0539 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=678920 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/May/msg00001.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/70957 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43420 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43573 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5281 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:097 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:098 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2011/02/21/2 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2011/02/21/5 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0908.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0909.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0910.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/ | Exploit, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46458 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0539 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=678920 | Patch |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "876B2575-4F81-4A70-9A88-9BEE44649626",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6-420:*:*:*:*:*:*:*",
"matchCriteriaId": "6AE63237-91FC-45BD-928F-AA428E2FFD95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2D86FC99-3521-4E22-8FD3-65CEB05A6342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.7-330:*:*:*:*:*:*:*",
"matchCriteriaId": "3684A343-ABD7-4B80-993C-1F3CC0F983DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*",
"matchCriteriaId": "3FAFAB6A-3299-4BEE-BDB9-3918DDA5D3DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname."
},
{
"lang": "es",
"value": "La funcionalidad safe-level de Ruby 1.8.6 hasta la versi\u00f3n 1.8.6-420, 1.8.7 hasta la 1.8.7-330 y 1.8.8dev permite a atacantes, dependiendo del contexto, modificar cadenas de texto a trav\u00e9s del m\u00e9todo Exception#to_s method, como se ha demostrado cambiando el pathname previsto."
}
],
"id": "CVE-2011-1005",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-03-02T20:00:01.880",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html"
},
{
"source": "secalert@redhat.com",
"url": "http://osvdb.org/70957"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/43420"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/43573"
},
{
"source": "secalert@redhat.com",
"url": "http://support.apple.com/kb/HT5281"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/5"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/46458"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2011/0539"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/70957"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43420"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43573"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT5281"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/46458"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0539"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2011-1005
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-1005",
"description": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"id": "GSD-2011-1005",
"references": [
"https://www.suse.com/security/cve/CVE-2011-1005.html",
"https://access.redhat.com/errata/RHSA-2011:0910",
"https://access.redhat.com/errata/RHSA-2011:0909",
"https://access.redhat.com/errata/RHSA-2011:0908",
"https://alas.aws.amazon.com/cve/html/CVE-2011-1005.html",
"https://linux.oracle.com/cve/CVE-2011-1005.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-1005"
],
"details": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"id": "GSD-2011-1005",
"modified": "2023-12-13T01:19:08.502680Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1005",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html",
"refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT5281",
"refsource": "MISC",
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html"
},
{
"name": "http://secunia.com/advisories/43573",
"refsource": "MISC",
"url": "http://secunia.com/advisories/43573"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"name": "http://www.openwall.com/lists/oss-security/2011/02/21/2",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/2"
},
{
"name": "http://www.openwall.com/lists/oss-security/2011/02/21/5",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/5"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2011-0909.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2011-0910.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"name": "http://www.vupen.com/english/advisories/2011/0539",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0539"
},
{
"name": "http://osvdb.org/70957",
"refsource": "MISC",
"url": "http://osvdb.org/70957"
},
{
"name": "http://secunia.com/advisories/43420",
"refsource": "MISC",
"url": "http://secunia.com/advisories/43420"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2011-0908.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"name": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"refsource": "MISC",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"name": "http://www.securityfocus.com/bid/46458",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/46458"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=678920",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.7-330:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.6-420:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1005"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110221 CVE request: ruby: FileUtils is vulnerable to symlink race attacks + Exception methods can bypass $SAFE",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/2"
},
{
"name": "[oss-security] 20110221 Re: CVE request: ruby: FileUtils is vulnerable to symlink race attacks + Exception methods can bypass $SAFE",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/5"
},
{
"name": "46458",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/46458"
},
{
"name": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=678920",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"name": "FEDORA-2011-1876",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html"
},
{
"name": "43420",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/43420"
},
{
"name": "FEDORA-2011-1913",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html"
},
{
"name": "ADV-2011-0539",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2011/0539"
},
{
"name": "70957",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/70957"
},
{
"name": "43573",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/43573"
},
{
"name": "RHSA-2011:0910",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"name": "RHSA-2011:0908",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"name": "RHSA-2011:0909",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"name": "MDVSA-2011:098",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"name": "MDVSA-2011:097",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"name": "APPLE-SA-2012-05-09-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT5281",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT5281"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2013-08-13T17:00Z",
"publishedDate": "2011-03-02T20:00Z"
}
}
}
GHSA-H2RC-3PPQ-6PJG
Vulnerability from github – Published: 2022-05-17 05:06 – Updated: 2025-04-11 03:44The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
{
"affected": [],
"aliases": [
"CVE-2011-1005"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-03-02T20:00:00Z",
"severity": "MODERATE"
},
"details": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"id": "GHSA-h2rc-3ppq-6pjg",
"modified": "2025-04-11T03:44:58Z",
"published": "2022-05-17T05:06:53Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html"
},
{
"type": "WEB",
"url": "http://osvdb.org/70957"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43420"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43573"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5281"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2011/02/21/5"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"type": "WEB",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/46458"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0539"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.